Universal Second Factor (U2F)

There is a critical need for improving the authentication standards because of breaches being caused by weak usernames and passwords. With more than 60% rise in credential thefts and violations occurring across global major corporate organizations, second factor authentication is a must cite{Ref1}. To address these concerning issues, the FIDO alliance launched a new protocol … Read more

Multimedia Compression Techniques

Abstract Multimedia data, increasing in the modern era because multimedia are the major source of information. Multimedia data required storage capacity and transmission bandwidth. These factors we need for multimedia compression technique. Uncompressed data required more storage and transmission bandwidth on the other hand, we have limited storage capacity and transmission bandwidth. But improving in … Read more

Creating security awareness

This thesis is about the topic security awareness. In fact it is about creating security awareness. As described in the research employees find themselves abroad working on engineering projects for Tideway Offshore Solutions. Rules and regulations for safety and security are strict on board ships and in port facilities. During travel in land abroad these … Read more

Software requirements

Abstract: Right around a quarter century later, eliciting, representing and organizing software requirements remains one of the most challenging problems in software development. Numerous prerequisites slips are passed undetected to the later periods of the life cycle and remedying these blunders amid or after execution have been discovered to be greatly excessive. Concentrated on have … Read more


CHAPTER 1 INTRODUCTION 1.1 OVERVIEW Multicast is internetwork service that provides delivery of data from source multiple recipients. It communicated to the large groups, a bandwidth efficient technique for delivering group-oriented applications over the internet. These applications such as video conferencing, interactive group games, video on demand (VoD), and mobile TV services. Multicast content distribution … Read more

Video games

On October 18, 1958 the American nuclear physicist William Higinbotham introduced the first two-person electronic game Tennis for Two during a Brookhaven National Laboratory open house demonstration (BNL.org). Tennis for Two consisted of a two-dimensional side view of a tennis court that was projected onto an oscilloscope screen which was similar to a black and … Read more

What is user experience?

Introduction What is user experience? “The goal of user experience design is to improve customer satisfaction and loyalty through the utility, ease of use, and pleasure provided in the interaction with a product. “ User experience design has revolutionised the entirety of the design process for many designers, companies and corporations. In the past we … Read more

Analyze the website requirements (both functional and non functional) of the XYZ bookstore

Introduction With the development of internet technology, many people choose to shop online instead of going to the old fashioned bookshop. E-commerce (B2C) today has a lot of advantages as people feel more relaxed shopping home nowadays as its very easy and convenient. Online bookstore website is frequently used as a platform for selling books … Read more

Electronic Publishing

In Pedek, and Robin, (2004) view, the exponential growth in the volume of published knowledge, main issue in reading information from libraries due to the literature seepage and scattering, ought to manage and furnish entry to ever increasing quantity of information, the increase in materials for publishing causing increased production costs, the need to cut … Read more

Management information system

1-INTRODUCTION In a competitive era which is lead by globalization and technology in the last few decades has increased the need of information system. Because of this Organizations have started to use information systems in various functions and department. Human resources management is one of the departments that mostly use management information system. Human resource … Read more

Student Organization Website for the Student Organization of Urdaneta City University

Chapter 1 PROJECT OVERVIEW Background of the Study One of the goals of higher education is to prepare students for their profession or occupation. In addition to the traditional classroom environment, there are other opportunities that can help students in promoting their professional interests and developing professional skills (Patterson, 2012). Furthermore, Student Organization has many … Read more

The Role and Responsibility of the External Auditor towards Cloud Computing

The Role and Responsibility of the External Auditor towards the Cloud Computing (An Empirical Study) Prepared by Hxxx Hxxxxxx Mxxxxxx 1.Chapter one: General Framework 1.1 Introduction and Background The cloud computing represents one of the challenges, which faces both accountants and auditors since some organizations have changed to adopt cloud computing. The cloud computing has … Read more

Data access control

Data access control is an helpful way to make sure that data security in the cloud. Unpaid to data outsource and untrusted cloud servers, it can access control becomes a exigent matter in cloud storage systems. Cipher text-Policy characteristic based Encryption is regard as one of the most fit technologies for data access control in … Read more

Multi-core processors

Introduction In this paper the we will talk about multi-core processors, specifically the Intel Core i7 processor. We will discuss what a processor is, what it’s used for in computer architectures, look at some different types of intel i7 processors and see how the cache component is implemented within intel i7 processors. First let’s discuss … Read more

Preventing congestion by combining traffic shaping and network border monitoring and control mechanisms

ABSTRACT Congestion is a known problem for packet switching networks like the Internet, and customarily, congestion occur on the Internet as packets traverse shared-networks. It is not uncommon for packets to arrive in bursts from sources in a network. Typically, congestion occurs when packet arrive in a burst or when sources are sending more data … Read more

Harnessing energy through knowledge – business development strategy of e-commerce companies

Introduction The forefront for business today is e-commerce. It remains for electronic business. It implies managing in merchandise and administrations through the electronic media and web. On the web, it identifies with a site of the merchant, who offers items or administrations straightforwardly to the client from the entry utilizing a computerized shopping basket or … Read more

ICON technology

Product Description: The age of smart technology is here. Today we have smart phones, smart watches, smart apps and much more. ICON smartech which is based out of Silicon Valley has come up with ICON dashboard which enables the consumer to make their home a smart home. The focus of ICON is to create a … Read more